Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats /

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Donaldson, Scott E. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Siegel, Stanley G. (http://id.loc.gov/vocabulary/relators/aut), Williams, Chris K. (http://id.loc.gov/vocabulary/relators/aut), Aslam, Abdul (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Part I: The Cybersecurity Challenge
  • Chapter 1: Defining the Cybersecurity Challenge
  • Chapter 2: Meeting the Cybersecurity Challenge
  • Part II: A New Enterprise Cybersecurity Architecture
  • Chapter 3: Enterprise Cybersecurity Architecture
  • Chapter 4: Implementing Enterprise Cybersecurity
  • Chapter 5: Operating Enterprise Cybersecurity
  • Chapter 6: Enterprise Cybersecurity and the Cloud
  • Chapter 7: Enterprise Cybersecurity for Mobile and BYOD
  • Part III: The Art of Cyber Defense
  • Chapter 8: Building an Effective Defense
  • Chapter 9: Responding to Incidents
  • Chapter 10: Managing a Cybersecurity Crisis
  • Part IV: Enterprise Cyber Defense Assessment
  • Chapter 11: Assessing Enterprise Cybersecurity
  • Chapter 12: Measuring a Cybersecurity Program
  • Chapter 13: Mapping Against Cybersecurity Frameworks
  • Part V: Enterprise Cybersecurity Program
  • Chapter 14: Managing an Enterprise Cybersecurity Program
  • Chapter 15: Looking to the Future
  • Part VI: Appendices
  • Appendix A: Sample Cybersecurity Policy
  • Appendix B: Cybersecurity Operational Processes
  • Appendix C: Object Measurement
  • Appendix D: Cybersecurity Sample Assessment
  • Appendix E: Cybersecurity Capability Value Scales.